Skip to main content

IT Outsourcing in Public Sector Contexts: Researching Risk and Strategy

  • Chapter
  • 267 Accesses

Abstract

The origins and history of a single case study of large-scale IT outsourcing in the 1994–99 period is investigated in the United Kingdom Defence sector. Such deals are high risk and we describe types of risk and how the client organization sought to mitigate these. These risks and mitigation approaches are then analyzed against a distinctive risk framework formulated for IT outsourcing. Risks emerging in terms of type and scope of outsourcing; vendor selection criteria and process, the role of the contract, retained capabilities and management processes, and partnering and relationship dimensions are then assessed against other research findings. Two additional distinctive risks are identified from the case history arising from the public sector context and supplier long-term market strategy. A contribution of the chapter is the revised risk framework for analyzing IT outsourcing that is then presented. Finally, we highlight the implications of these findings for future research and practice.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Alberthal, L. (1994) User Satisfaction — The Global Challenge. Address to the 9th World Computing Services Congress, Yokohama, Japan.

    Google Scholar 

  • Ang, S. and Straub, D. (1998) “Production and Transaction Economies and IS Outsourcing: A Study of the US Banking Industry”, MIS Quarterly, December, 535–542.

    Google Scholar 

  • Ang, S. and Toh, S-K (1998) “Failure in Software Outsourcing: A Case Analysis”, in Willcocks, L. and Lacity, M. (eds) Strategic Sourcing of Information Systems, Wiley, Chichester.

    Google Scholar 

  • Applegate, L. and Montealegre, R. (1991) “Eastman Kodak Company: Managing Information Systems through Strategic Alliances”, Harvard Business School Case 9–192-030, Harvard Business School, Boston, MA.

    Google Scholar 

  • Auwers, T. and Deschoolmeester, D. (1993) The Dynamics of an Outsourcing Relationship: A Case Study in the Belgian Food Industry. Paper at the Outsourcing Of Information Systems Services Conference, University of Twente, The Netherlands, 20–22nd May.

    Google Scholar 

  • Benbasat, I. and Zmud, R. (1999) “Empirical Research in Information Systems: The Practice of Relevance”, MIS Quarterly, 23, 1, 3–16.

    Article  Google Scholar 

  • Bicknell, D. (1996) “Special Report: Contract Dispute: Miami Blues”, Computer Weekly, 26–27.

    Google Scholar 

  • Boehm, B. (1991) “Software Risk Management: Principles and Practices”, IEEE Software, January, 32–41.

    Google Scholar 

  • Charette, R. (1991) Application Strategies for Risk Analysis, McGraw Hill, New York.

    Google Scholar 

  • Clement, D. (1996) “Big Mac Poised to Sign with Big Blue”, Sunday Business — Computer Age, London, 2.

    Google Scholar 

  • Collins, T. (1999) “End of the EDS Dream”, Computer Weekly, October 28, 1, 22.

    Google Scholar 

  • Collins, T. and Phillips, S. (1999) “Utility To Pull Plug on Perot Systems Deal”, Computer Weekly, March 25, 1.

    Google Scholar 

  • Craig Smith, A. (1990) “The Case Study: A Useful Research Method for Information Management”, Journal Of Information Technology, 5, 2, 123–133.

    Article  Google Scholar 

  • Cronk, J. and Sharp, J. (1998) “A Framework for Deciding What to Outsource in Information Technology”, in Willcocks, L. and Lacity, M. (eds), Strategic Sourcing of Information Systems, Wiley, Chichester.

    Google Scholar 

  • Cross, J. (1995) “IT Outsourcing: British Petroleum’s Competitive Approach”, Harvard Business Review, May-June, 94–102.

    Google Scholar 

  • Currie, W. and Willcocks, L. (1998) New Strategies in IT Outsourcing: Major Trends and Global Best Practice, Business Intelligence, London.

    Google Scholar 

  • Davenport, T. and Markus, L. (1999) “Rigor vs. Relevance Revisited: Response to Benbasat and Zmud”, MIS Quarterly, 23, 1, 19–23.

    Article  Google Scholar 

  • Davies, S. and Hosein, G. (2007) Identity Policy: Risks and Rewards, LSE, London, April.

    Google Scholar 

  • De Loof, L. (1998) “Information Systems Outsourcing: Theories, Case Evidence and a Decision Framework”, in Willeocks, L. and Lacity, M. (eds) Strategic Sourcing Of Information Systems, Wiley, Chichester.

    Google Scholar 

  • Dempsey, M. (1999) “Outsourcing Refusenik Enjoys His Vindication”, Financial Times- IT Review, August 4, 3.

    Google Scholar 

  • DiRomualdo, A. and Gurbaxani, V. (1998) “Strategic Intent for IT Outsourcing”, Sloan Management Review, 39, 4, 1–26.

    Google Scholar 

  • Dunleavy, P., Margetts, H., Bastou, S. and Tinkler, J. (2007) Digital Era Governance, Oxford University Press, Oxford.

    Google Scholar 

  • Earl, M.J. (1996) “The Risks of Outsourcing IT”, Sloan Management Review, 37, 3, 26–32.

    Google Scholar 

  • Feeny, D., Earl, M. and Edwards, B. (1997) “Organizational Arrangements for IS: Roles of Users and Specialists”, in Willeocks, L., Feeny, D. and Islei, G. (eds) Managing IT As A Strategic Resource, McGraw Hill, Maidenhead.

    Google Scholar 

  • Feeny, D. and Willeocks, L. (1998) “Core IS Capabilities for Exploiting IT”, Sloan Management Review, 39, 3, 1–26.

    Google Scholar 

  • Fitzgerald, G. and Willeocks, L. (1994) Contracts and Partnerships in the Outsourcing of IT. 15th International Conference on Information Systems, Vancouver, Canada, December.

    Google Scholar 

  • Griffiths, C. and Newman, M. (eds) (1996) “Risk Management and Information Systems”, Journal Of Information Technology, Special Issue, 11, 4.

    Google Scholar 

  • Grover, V., Cheon, M.J. and Teng, J. (1995) Theoretical Perspectives on the Outsourcing of Information Technology. Working Paper, University of South Carolina, Columbia, 1–27.

    Google Scholar 

  • Henderson, J.C. (1990) “Plugging into Strategic Partnerships: The Critical IS Connection”, Sloan Management Review, Spring, 7–18.

    Google Scholar 

  • Hoffmann, T. (1996) “JP Morgan to Save $50 million Via Outsourcing Pact”, Computer-world, 30, 21, May 20, 10.

    Google Scholar 

  • House of Commons Committee of Public Accounts (2007a) Central Governments Use of Consultants, HMSO, London HC309 June 2007.

    Google Scholar 

  • House of Commons Committee of Public Accounts (2007b) Delivering Successful IT-enabled Business Change, HMSO, London HCl 13 June 2007.

    Google Scholar 

  • House of Commons Committee of Public Accounts (2007c) HM Revenue and Customs: ASPIREThe Re-competition of Outsourced IT Services, HMSO, London HCl 79 June 2007.

    Google Scholar 

  • House of Commons Committee of Public Accounts (2007d) Department of Health: The National Programme for IT in the NHS, HMSO, London, HC390 April 2007.

    Google Scholar 

  • Huber, R.L. (1993) “How Continental Bank Outsourced its ‘Crown Jewels’”, Harvard Business Review, January-February, 121–129.

    Google Scholar 

  • Impact Group (1999) Creating New Value from an IT Outsourcing Relationship, Impact Report, London.

    Google Scholar 

  • Jurison, J. (1995) “The Role of Risk and Return in Information Technology Outsourcing Decisions”, Journal Of Information Technology, 10, 4, 239–247.

    Article  Google Scholar 

  • Kern, T. and Willeocks, L. (1996) “The Enabling and Determining Environment: Neglected Issues in an IT/IS Outsourcing Strategy”, European Conference of Information Systems, Lisbon, Portugal.

    Google Scholar 

  • Kern, T. and Willeocks, L. (2000) “Cooperative Relationship Strategy in Global IT Outsourcing: The Case of Xerox Corporation”, in Faulkner, D. and De Rond, M. (eds) Perspectives On Cooperation, Oxford University Press, Oxford.

    Google Scholar 

  • Kern, T. and Willeocks, L. (2001) The Relationship Advantage: Information Technology, Sourcing and Management, Oxford University Press, Oxford.

    Book  Google Scholar 

  • Kern, T., Willcocks, L. and Heck, E. (1999) “Relational Trauma: Evidence of a Winner’s Curse in ICT Outsourcing”, OXIIM Working Paper 99/2, Templeton College, Oxford.

    Google Scholar 

  • Kirkpatrick, D. (1991) “Why Not Farm Out Your Computer?”, Fortune: 73–78.

    Google Scholar 

  • Klepper, R. (1994) “Outsourcing Relationships”, in Khosrowpour, M. (ed.) Managing Information Technology with Outsourcing, Idea Group Publishing, Harrisburg, PA.

    Google Scholar 

  • Klepper, R. (1995) “The Management of Partnering Development in IS Outsourcing”, Journal of Information Technology, 10, 4, 249–258.

    Article  Google Scholar 

  • Klepper, R. and Jones, W. (1998) Outsourcing Information Technology, Systems and Services, Prentice Hall, New Jersey.

    Google Scholar 

  • Kumar, K. and Willcocks, L. (1999) “Holiday Inn’s Passage to India”, in Carmel, E. (ed.) Global Software Teams, Prentice Hall, New Jersey.

    Google Scholar 

  • Lacity, M.C. and Hirschheim, R. (1993) Infortnation Systems Outsourcing: Myths, Metaphors and Realities, John Wiley, Chichester.

    Google Scholar 

  • Lacity, M. and Hirschheim, R. (1995) Beyond the Information Systems Outsourcing Bandwagon, Wiley, Chichester.

    Google Scholar 

  • Lacity, M. and Willcocks, L. (1996) Best Practices in Information Technology Sourcing. Executive Report No 2, June. Templeton College, Oxford.

    Google Scholar 

  • Lacity, M. and Willcocks, L. (1998) “An Empirical Investigation of Information Technology Sourcing Practices: Lessons from Experience”, MIS Quarterly, 22, 3, 363–408.

    Article  Google Scholar 

  • Lacity, M. and Willcocks, L. (2000) Inside IT Outsourcing: A State-Of-Art Report, Executive Research Report, Templeton College, Oxford.

    Google Scholar 

  • Lacity, M. and Willcocks, L. (2001) Global IT Outsourcing: Search for Business Advantage, Wiley, Chichester.

    Google Scholar 

  • Lacity, M. and Willcocks, L. (2009) Information Systems and Outsourcing: Studies in Theory and Practice, Palgrave, London.

    Google Scholar 

  • Lacity, M., Willcocks, L. and Feeny, D. (1995) “IT Outsourcing: Maximize Flexibility And Control”, Harvard Business Review, May-June, 94–104.

    Google Scholar 

  • Lacity, M., Willcocks, L. and Feeny, D. (1996) “The Value of Selective IT Sourcing”, Sloan Management Review, Spring, 37, 3, 13–25.

    Google Scholar 

  • Lee, A. (1999) “Rigor and Relevance in MIS Research: Beyond the Approach of Positivism Alone”, MIS Quarterly, 23, 1, 29–33.

    Article  Google Scholar 

  • Lincoln, Y. and Guba, E. (1985) Naturalistic Enquiry, Sage, Beverly Hills.

    Google Scholar 

  • Loh, L. and Venkatraman, N. (1992) “Diffusion of Information Technology Outsourcing: Influence Sources and the Kodak Effect”, Information Systems Research, 4, 3, 334–358.

    Article  Google Scholar 

  • Lyytinen, K., Mathiassen, L. and Ropponen, J. (1998) “Attention Shaping and Software Risk: A Categorical Analysis of Four Classical Risk Management Approaches”, Information Systems Research, 9, 3, 233–255.

    Article  Google Scholar 

  • McFarlan, F.W. and Nolan, R. (1995) “How to Manage an IT Outsourcing Alliance”, Sloan Management Review, Winter, 9–23.

    Google Scholar 

  • McLellan, K., Marcolin, B. and Beamish, P. (1998) “Financial and Strategic Motivations Behind IS Outsourcing”, in Willcocks, L. and Lacity, M. (eds) Strategic Sourcing Of Information Systems, Wiley, Chichester.

    Google Scholar 

  • Michell, V. and Fitzgerald, G. (1997) “IT Outsourcing, Vendor Selection and the Vendor Marketplace”, Journal of In formation Technology, 10, 3, 135–147.

    Google Scholar 

  • Moad, J. (1993) “Inside an Outsourcing Deal”, Datamation, 20–27.

    Google Scholar 

  • Morris, P. (1996) “Project Management: Lessons from IT and Non-IT Projects”, in Earl, M. (ed.) Information Management — The Organizational Dimension, Oxford University Press, Oxford.

    Google Scholar 

  • National Audit Office (2006) Department of Health — The National Programme for IT in the NHS. HCl 173, HUSO, London.

    Google Scholar 

  • National Audit Office (2008) Defence Information Infrastructure: Report to the Comptroller and Auditor General HC788 Session, HMSO, London.

    Google Scholar 

  • Osei-Bryson, K. and Ngwenyama, O. (2006) “Managing Risks in Information Systems Outsourcing”, European Journal of Operational Research, 174, 1, 245–264.

    Article  Google Scholar 

  • Pettigrew, A. (1985) The Awakening Giant: Continuity and Change In ICI, Basil Blackwell, Oxford.

    Google Scholar 

  • Pettigrew, A. (1990) “Longitudinal Field Research on Change: Theory and Practice”, Organization Science, 1, 3, 267–292.

    Article  Google Scholar 

  • Pettigrew, A. and Whipp, R. (1991) Managing Change for Competitive Success, Blackwell, Oxford.

    Google Scholar 

  • Poston, T. (1997) “Lloyds Ditches 50 Million Pound Outsourcing Contract”, Computer Weekly, January 30, 1.

    Google Scholar 

  • Reynolds, P. Willcocks, L. and Feeny, D. (2007) “Evolving IS Capabilities to Leverage the External IT Services Market”, MISQ Executive, 6, 3, 127–145.

    Google Scholar 

  • Rockart, J., Earl, M. et al., (1996) “Eight Imperatives for the New IT Organization”, Sloan Management Review, Fall, 1–25.

    Google Scholar 

  • Ropponen, J. (1999) “Risk Assessment and Management Practices in Software Development”, in Willcocks, L. and Lester, S. (eds) Beyond the IT Productivity Paradox, Wiley, Chichester.

    Google Scholar 

  • Sanders, P. (1982) “Phenomenology: A New Way of Viewing Organizational Research”, Academy of Management Review, 7, 3, 353–360.

    Google Scholar 

  • Sauer, C. and Willcocks, L. (2007) “Unreasonable Expectations — NHS IT, Greek Choruses and the Games Institutions Play around Mega-Programmes”, in Sauer, C. and Willcocks, L. (eds) NHS Special Issue, Journal of Information Technology, 22, 3.

    Google Scholar 

  • Shepherd, AJ. (1995) IT Outsourcing Hype and Reality: A Practitioner Perspective. Oxford Institute of Information Management, RDP85/6: 31, Templeton College, Oxford.

    Google Scholar 

  • Strassmann, P. (1998) “The Squandered Computer”, Information Economics Press, New Canaan.

    Google Scholar 

  • Tho, I. (2005) Managing the Risks of IT Outsourcing, Butterworth Heinemann, Oxford.

    Google Scholar 

  • Thomas, K. and Schneider, K. (1997) “Ernst and Young Scraps 45 Million Pound Model FM Deal”, Computer Weekly, March 13, 1.

    Google Scholar 

  • Vowler, J. (1996) “Management: Lessons in Outsourcing”, Computer Weekly, 26.

    Google Scholar 

  • Walker, C. (1996) “Giant Contracts Boost UK Outsourcing Growth”, Computer Weekly, 12.

    Google Scholar 

  • Walsham, G. and Sahay, S. (1999) “GIS For District-Level Administration In India: Problems and Opportunities”, MIS Quarterly, 23, 1, 39–65.

    Google Scholar 

  • White, R. and James, B. (1996) The Outsourcing Manual, Gower, London.

    Google Scholar 

  • Willcocks, L. (1994) “Managing Information Systems in UK Public Administration: Issues and Prospects”, Public Administration, 72, 1, 13–32.

    Article  Google Scholar 

  • Willcocks, L. (1998) “Reducing the Risks of Outsourced IT”, in Financial Times (ed.) Mastering Global Business, Financial Times/Pitman, London.

    Google Scholar 

  • Willcocks, L. and Choi, C. (1995) “Co-operative Partnership and Total IT Outsourcing: From Contractual Obligation to Strategic Alliance”, European Management Journal, 13, 1, 67–78.

    Article  Google Scholar 

  • Willcocks, L. and Craig, A. (2007) The Outsourcing Enterprise 4 — Building Retained Core Capabilities, Logica, London.

    Google Scholar 

  • Willcocks, L. and Craig, A. (2009) The Outsourcing Enterprise 5 — Step Change: Collaborating To Innovate, Logica, London.

    Google Scholar 

  • Willcocks, L. and Currie, W. (1998) “Information Technology in Public Services: Towards the Contractual Organization?”, British Journal Of Management, 8, S107–120.

    Article  Google Scholar 

  • Willcocks, L. and Fitzgerald, G. (1994a) A Business Guide To IT Outsourcing, Business Intelligence, London.

    Google Scholar 

  • Willcocks, L. and Fitzgerald, G. (1994b) IT Outsourcing and the Changing Shape of the Information Systems Function: Recent Research Findings. Oxford, Oxford Institute of Information Management, Research and Discussion Paper, Templeton College, Oxford.

    Google Scholar 

  • Willcocks, L., Fitzgerald, G. and Feeny, D. (1995) “IT Outsourcing: A Strategic Approach”, Long Range Planning, 28, 5, 59–70.

    Article  Google Scholar 

  • Willcocks, L., Fitzgerald, G. and Lacity, M. (1996) “To Outsource IT or Not? Recent Research on Economics and Evaluation Practice”, European Journal of In formation Systems, 5, 143–160.

    Article  Google Scholar 

  • Willcocks, L. and Griffiths, C. (1996) “Predicting Risk of Failure in Large-Scale Information Technology Projects”, Technological Forecasting and Social Change, 47, 205–228.

    Article  Google Scholar 

  • Willcocks, L. and Kern, T. (1997) IT Outsourcing as Strategic Partnering: The Case of the UK Inland Revenue. Proceedings of the Fifth European Conference in Information Systems, June, Cork, Ireland.

    Google Scholar 

  • Willcocks, L. and Lacity, M. (eds) (1998) Strategic Sourcing Of Information Systems, Wiley, Chichester.

    Google Scholar 

  • Willcocks, L. and Lacity, M. (1999) “IT Outsourcing in Insurance Services: Risk, Creative Contracting and Business Advantage”, Information Systems Journal, 9, 163–180.

    Article  Google Scholar 

  • Willcocks, L. and Lacity, M. (2000) “Strategic Dimensions in IT Outsourcing”, in Davenport, T. and Marchand, D. (eds) Mastering Information Management, FT/Pitman, London.

    Google Scholar 

  • Willcocks, L. and Lacity, M. (2006) Global Sourcing of Business and IT Services, Palgrave, London.

    Book  Google Scholar 

  • Willcocks, L. and Lacity, M. (2009) Research Studies in Information Technology Outsourcing: Perspectives, Practices and Globalization. Volume 1 — Making IT Outsourcing Decisions; Volume 2 — Managing Outsourcing Relationships; Volume 3 — Global Outsourcing: Issues and Trends, Sage, London.

    Google Scholar 

  • Willcocks, L., Lacity, M. and Fitzgerald, G. (1995) “IT Outsourcing in Europe and the USA: Assessment Issues”, International Journal Of Information Management, 15, 5, 333–351.

    Article  Google Scholar 

  • Willcocks, L., Lacity, M. and Kern, T. (1999) “Risk Mitigation in IT Outsourcing Strategy Revisited: Longitudinal Case Research”, Journal of Strategic Information Systems, April, 8, 2, 285–314.

    Article  Google Scholar 

  • Willcocks, L. and Lee, A. (2008) Series Introduction to Major Currents In the Information Systems Field, Sage, London. Six volumes.

    Google Scholar 

  • Willcocks, L. and Margetts, H. (1994) “Risk Assessment in Information Systems”, European Journal Of Information Systems, 4, 1, 1–12.

    Article  Google Scholar 

  • Williamson, O. (1996) The Mechanisms Of Governance, Oxford University Press, Oxford.

    Google Scholar 

Download references

Authors

Copyright information

© 2009 Leslie Willcocks, Mary Lacity and Thomas Kern

About this chapter

Cite this chapter

Willcocks, L., Lacity, M., Kern, T. (2009). IT Outsourcing in Public Sector Contexts: Researching Risk and Strategy. In: The Practice of Outsourcing. Palgrave Macmillan, London. https://doi.org/10.1057/9780230240841_6

Download citation

Publish with us

Policies and ethics